Upwork VOICE OVER IP TEST 2016

Hello Freelancer, Welcome to allupworktestanswers.com Here to get the VOICE OVER IP TEST of Latest version 2016. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website. 



1. Which of the following are the major VoIP protocols?
Answers:
  1. SIP
  2. H.323
  3. SMTP
  4. MGCP
  5. FTP
  6. RTP
  7. RTCP
2. What are the three main steps required in the analog-to-digital conversion process?
Answers:
  1. Compression
  2. Encoding
  3. Filtering
  4. Recording
  5. Sampling
  6. Quantization
3. What are the three elements of a security policy necessary for a VoIP network?
Answers:
  1. Transport Security
  2. Data Security
  3. Network Security
  4. Intrusion Detection
4. Which of the following are types of address signaling?
Answers:
  1. TDM
  2. Pulse dialing
  3. DTMF
  4. FDM
5. Which of the following signaling protocols can be used with gateways over a VoIP network?
Answers:
  1. SIP
  2. H.264
  3. H.323
  4. MGCP
6. Which of the following provide transport security by using encryption, data integrity and data authentication?
Answers:
  1. VPNs
  2. Firewalls
  3. Antivirus
  4. IPSec
7. Which of the following protocols are assigned ports for each voice call?
Answers:
  1. RTP in transmit direction
  2. RTCP in transmit direction
  3. RTP in receive direction
  4. RTCP in receive direction
8. Through which protocols can VPNs be implemented at layer 2?
Answers:
  1. NTP
  2. PPTP
  3. RTCP
  4. L2TP
9. Which of the following are the major framing standards used for Channel Associated Signaling (CAS) by T1?
Answers:
  1. Super Frame (SF)
  2. Multi Frame (MF)
  3. Super Extended Frame (SEF)
  4. Extended Super Frame (ESF)
10. Which of the following services are provided by Real-time Transfer Protocol(RTP)?
Answers:
  1. Time stamping
  2. Acknowledgements
  3. Sequence numbering
  4. Delivery monitoring
11. Which of the following are voice compression techniques?
Answers:
  1. Waveform algorithms
  2. Frequency algorithms
  3. Source algorithms
  4. Encoding algorithms
12. Which of the following is used by an exchange to convert analog audio to digitized audio?
Answers:
  1. SS7
  2. PCM
  3. ISDN
  4. DSL
13. Which of the following signaling protocols is based on the ISDN Q.931 standard?
Answers:
  1. Q.933A
  2. DPNSS
  3. QSIG
  4. SS7
14. How many voice conversations are possible on an E1 line simultaneously?
Answers:
  1. 16
  2. 24
  3. 30
  4. 32
15. What is the full form of 3DES?
Answers:
  1. Triple Decoding Encoding Standard
  2. Triple Data Encryption Standard
  3. Triple Data Encoding Standard
  4. Triple Digital Encryption Service
16. According to the OSI model, which layer performs the function of transforming bits of data into electrical signals and sending those signals across the media?
Answers:
  1. Network
  2. Data Link
  3. Transport
  4. Physical
17. What is the full form of BGP?
Answers:
  1. Border Gateway Protocol
  2. Border Gateway Police
  3. Border Global Position
  4. Border Global Protocol
18. How many bits are there in a Class B address in Net ID (Network portion) and Host ID (Host Portion) fields by default?
Answers:
  1. Net ID=8 bits & Host ID=24 bits
  2. Net ID=16 bits & Host ID=16 bits
  3. Net ID=24 bits & Host ID=8 bits
  4. None of the above
19. What is the full form of POTS?
Answers:
  1. Public Old Telephone Service
  2. Plain Old Telephone Service
  3. Plain Old Telecommunication System
  4. Protocols Of Telecommunication System
20. What is the full form of L2TP?
Answers:
  1. Level 2 Technology Protocol
  2. Level 2 Transmission Protocol
  3. Layer 2 Transport Protocol
  4. Layer 2 Tunneling Protocol
21. Which of the following is responsible for electrical echo on telephone networks?
Answers:
  1. Speakerphones
  2. Impedance mismatch
  3. Incorrect voltage
  4. All of the above
22. State whether true or false:
Stateful firewalls do not remember the previous traffic that has occurred earlier in the session
Answers:
  1. True
  2. False
23. What are the functions of Call Control?
Answers:
  1. Call setup
  2. Call maintenance
  3. Call termination
  4. All of the above
24. Which of the following is the most common trunk signal type used by E&M signaling?
Answers:
  1. Wink-start
  2. Immediate-start
  3. Delay-start
  4. Loop-start
25. What is the range of the frequency of a telephone channel?
Answers:
  1. 10 Hz to 9000 Hz
  2. 300 Hz to 3400 Hz
  3. 200 Hz to 20000 Hz
  4. 16 Hz to 1600 Hz
26. What is the full form of CCS?
Answers:
  1. Conditional Channel Signaling
  2. Combined Channel Signaling
  3. Common Channel Signaling
  4. Collective Channel Signaling
27. Which of the following is one of the most important things common in all IP phones?
Answers:
  1. Global Positioning System (GPS)
  2. Bluetooth
  3. Network Interface Card (NIC)
  4. None of the above
28. What do you call a medium which allows multiple channels?
Answers:
  1. Multi mode
  2. Single mode
  3. Broadband
  4. Baseband
29. Which of the following methods is most commonly used to remove echo in telephone networks these days?
Answers:
  1. Echo Avoidance
  2. Echo Suppression
  3. Echo Cancellation
  4. All of the above
30. What is the minimum bandwidth required for VoIP to deliver high quality services?
Answers:
  1. 32 kbps
  2. 64 kbps
  3. 128 kbps
  4. 256 kbps
31. According to the ITU standard G.114, what is the maximum delay acceptable for high quality voice?
Answers:
  1. 100 ms
  2. 125 ms
  3. 150 ms
  4. 200 ms
32. Which of the following classes are used for host addressing?
Answers:
  1. Class A
  2. Class B
  3. Class C
  4. Class D
  5. Class E
  6. All of the above
33. What is the function of D (Data) channel in ISDN?
Answers:
  1. It is used for carrying data
  2. It is used for carrying voice
  3. It is used for carrying signaling information
  4. All of the above
34. Which TCP port number is used by H.323 protocol for call setup?
Answers:
  1. 5060
  2. 1720
  3. 1718
  4. 2727
35. What is the path of wires that connect the subscriber’s telephone to the telephone company’s switch located at the latter’s central office known as?
Answers:
  1. Trunk
  2. Local Loop
  3. Demarcation Point
  4. Point of Presence
36. Which of the following can be used to hide internal network addresses and allow several computers on LAN to simultaneously share the router’s global IP address?
Answers:
  1. DHCP
  2. Firewall
  3. NAT
  4. None of the above
37. Which of the following VoIP protocols define end-to-end call signaling methods?
Answers:
  1. SIP
  2. MGCP
  3. RTP
  4. H.323
38. Which of the following is the reason for using UDP instead of TCP for voice transmission?
Answers:
  1. UDP is more reliable as compared to TCP
  2. UDP is fast as compared to TCP
  3. UDP re-transmits any packet lost during transmission whereas TCP does not
  4. All of the above
39. Which of the following has the correct sequence (from the lowest layer to the highest)?
Answers:
  1. Physical, Network, Data Link, Session, Transport, Presentation, Application
  2. Physical, Data Link, Network, Transport, Session, Presentation, Application<>/span<
  3. Transport, Session, Data Link, Application, Presentation, Network, Physical
  4. Physical, Data Link, Network, Transport, Presentation, Session, Application
40. What is the full form of DSL?
Answers:
  1. Digital Subscription Line
  2. Digital Super Link
  3. Digital Speed Line
  4. Digital Subscriber Line
41. State whether true or false:
QSIG is implemented on PRI interfaces only.
Answers:
  1. True
  2. False
42. Which of the following protocols is used in a VoIP call at the application layer of the TCP/IP model?
Answers:
  1. NTP
  2. RTCP
  3. RTP
  4. All of the above
43. For which of the following services is SS7 responsible?
Answers:
  1. Basic call setup, management and tearing down of connections
  2. Call forwarding
  3. Calling party number display
  4. All of the above
44. State whether true or false
VoIP runs only on the internet. It cannot run on any other network.
Answers:
  1. True
  2. False
45. Which of the following are examples of CCS?
Answers:
  1. QSIG
  2. Q.933A
  3. SS7
  4. DPNSS
  5. All of the above
46. Which of the following devices is used to physically connect all network devices like PCs, IP phones etc. to the LAN?
Answers:
  1. Router
  2. Switch
  3. Firewall
  4. Server
47. Which of the following are ITU standards for voice compression?
Answers:
  1. G.701
  2. G.711
  3. G.726
  4. G.728
  5. G.729
  6. G.729A
  7. All of the above
48. What is a soft phone?
Answers:
  1. It is a hardware phone especially made for VoIP
  2. It is a software that works on a laptop, desktop or a pocket PC
  3. It is the traditional phone that we use these days
  4. None of the above
49. On which of the following IP enabled devices can VoIP telephone services work?
Answers:
  1. Computer
  2. Personal Digital Assistant (PDA)
  3. IP telephone
  4. All of the above
50. What is the full form of DPNSS?
Answers:
  1. Dedicated Private Network Signaling Services
  2. Digital Public Network Signaling System
  3. Dual Primary Network System Signaling
  4. Digital Private Network Signaling System
51. Which of the following VoIP protocols is an emerging standard for PSTN gateway control?
Answers:
  1. SIP
  2. MGCP
  3. RTP
  4. H.323
52. How many bits are there in a MAC address?
Answers:
  1. 32 bits
  2. 48 bits
  3. 24 bits
  4. 16 bits
53. Is it possible to transport fax and modem traffic over a VoIP network?
Answers:
  1. Yes
  2. No
54. State whether true or false:
RTP (Real-time Transport Protocol) requests retransmission if a voice packet is lost.
Answers:
  1. True
  2. False
55. Which of the following signaling protocols is used in a common channel to signal all other channels in ISDN?
Answers:
  1. Q.933A
  2. ANSI
  3. Q.931
  4. DPNSS
56. Between Asymmetric and Symmetric transmissions, which statement is true of Symmetric transmission?
Answers:
  1. In Symmetric transmission, the upstream data rate is more than the downstream data rate
  2. In Symmetric transmission, the upstream data rate is less than the downstream data rate
  3. In Symmetric transmission, the upstream data rate is the same as the downstream data rate
  4. Symmetric transmission is less expensive as compared to Asymmetric transmission
57. What is the full form of SS7?
Answers:
  1. Secure Signal 7
  2. Secure System 7
  3. Signaling System 7
  4. Switch Signal 7
58. Which of the following is a telephony signaling protocol suite used to set up most of the world’s PSTN calls?
Answers:
  1. PCM
  2. SS6
  3. ISDN
  4. SS7
59. Which of the following modes of delivery are supported by IPsec?
Answers:
  1. Transport
  2. Encapsulation
  3. Tunnel
  4. All of the above
60. Which of the following cables is mostly used in traditional telephones?
Answers:
  1. CAT 5 cable
  2. Copper wire
  3. Fibre Optic
  4. All of the above
61. What is the full form of TDM?
Answers:
  1. Time Division Multiplexing
  2. Telephone Domain Management
  3. Transmission Division Multiplexing
  4. Time Domain Multiplexing
62. Which protocol provides end-to-end delivery services for data that requires real-time support such as interactive voice and video?
Answers:
  1. Real-time Transport Protocol (RTP)
  2. Resource Reservation Protocol (RSVP)
  3. Compressed Real-time Transport Protocol (CRTP)
  4. Real-time Transport Control Protocol (RTCP)
63. What is the full form of PSTN?
Answers:
  1. Public Switched Telephone Network
  2. Packet Service of Telephone Network
  3. Plain Switched Telephone Network
  4. Public Subscriber Trunk Network
64. On which layer of the OSI model does TCP & UDP work?
Answers:
  1. Transport Layer
  2. Session Layer
  3. Presentation Layer
  4. Network Layer
65. Which of the following protocols does VoIP use at the transport layer of the TCP/IP model?
Answers:
  1. TCP
  2. UDP
  3. SMTP
  4. None of the above
66. What is the length of IP v4 addresses (in bits)?
Answers:
  1. 16 bits
  2. 32 bits
  3. 48 bits
  4. 64 bits
67. Is it possible for a POTS line running broadband DSL service to support VoIP telephony in the home?
Answers:
  1. Yes
  2. No

Finally no more words require about the VOICE OVER IP TEST  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box.  Thank you very mutch for being with us.

0 comments: